International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 08 Issue: 04 | Apr 2021
p-ISSN: 2395-0072
www.irjet.net
Security in Ad-Hoc Network Using Encrypted Data Transmission and Steganography Prof. Ravindra Ghugare, Ankita Patil, Ajay Jha, Dhiraj Kuslekar Prof Ravindra Ghugare, Department of Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India. Ankita Patil, Dept of Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai,India Dhiraj Kuslekar, Dept of Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India Ajay Jha, Dept of Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India. ------------------------------------------------------------------------***------------------------------------------------------------------------or through a web-based interface. The storage Abstract-Currently, there is a growing trend of architectures build one virtual memory system. The info once keep on cupboard space has the subsequent threats: 1. Once knowledge is distributed, it's keep at multiple locations increasing the danger of unauthorized physical access to the info. 2. The amount of individuals with access to the info united nations agency may be compromised (i.E. Bribed or coerced) will increase dramatically. 3. It will increase the amount of networks over that the info travels. Rather than simply an {area|a neighborhood} area network (lan) or enclosure network (san), knowledge keep on a cupboard space needs a wan (wide space network) to attach them each. 4. Sharing of storage and networks with several alternative users/customers it's doable for alternative customers to access your knowledge. To secure knowledge, most systems use a mix of techniques, including: 1. Encryption, which suggests they use a posh rule to write in code data. To rewrite the encrypted files, a user wants associate degree secret writing key. Whereas it's doable to crack encrypted data, most hackers haven't got access to the quantity of laptop process power they'd have to be compelled to decode data. 2. Authentication processes, that need making a user name and secret. 3. Authorization practices -- the consumer lists the people that square measure licensed to access data keep on the storage system. Several companies have multiple levels of authorization. As an example, a front-line worker might need terribly restricted access to knowledge keep on a storage system, whereas the top of human resources might need intensive access to files. Storage approach poses a possible security threat to your knowledge and furthermore, solely the secret access to storage isn't decent because the secret will be hacked by associate degree entrant. Conjointly the info will be captured en-
outsourcing data to a remote cloud, where people send their data to a Cloud Service Provider (CSP) that provides large storage space at a low cost. As a result, users can reduce the time and effort needed to manage local data storage. Meanwhile, once data is moved to the cloud, the owner loses ownership of it, which inevitably introduces new security threats to the integrity and confidentiality of the data. As a result, efficient and effective methods for ensuring the data integrity and confidentiality of outsourced data on untrusted cloud servers are needed. The previously proposed protocols fail to provide users with a high degree of security assurance. To resolve these problems, we propose an effective and reliable protocol in this paper. Our system enables a third-party auditor to check the data integrity on a regular basis. Keywords — Steganography, Cryptography, Cloud Service Provider, Elliptical Curve Cryptography, Least Significant Bit
Introduction With the invention of storage, the times of keeping all of your documents, photos, music files etc. On your computer’s hardware square measure step by step coming back to a detailed. Today, the storage is fulfilling the necessity for additional cupboard space to carry all of your digital knowledge. Cupboard space suppliers operate giant knowledge centers, and folks united nations agency need their knowledge to be hosted purchase or lease storage capability from them. Operators, within the background, virtualizes the resources consistent with the wants of the client and expose them as storage pools, that the purchasers will themselves use to store files or knowledge objects. Physically, the resource could span across multiple servers. Storage will be used from smaller computing devices to desktop computers and servers. Storage services is also accessed through an internet service api
© 2021, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 63